Clickjacking

Theory

Lots of websites allow to browsers to render them in a <frame>arrow-up-right, <iframe>arrow-up-right, <embed>arrow-up-right or <object>arrow-up-right. This allows attackers to "load" the website in a transparent layer and trick users into thinking they are browsing the legitimate website. This allows attackers to "hijack" their clicks and make them do something else (Twitter wormarrow-up-right, Facebook likesarrow-up-right).

HTTP security headers like XFO (X-Frame-Options) and CSP (Content-Security-Policy) mitigate clickjacking attacks.

Practice

(left) vulnerable | not vulnerable (right)

The following HTML code can be used in a browser to attempt a clickjacking on a target URL.

Resources

Last updated

Was this helpful?